Pass the Paloalto Networks PSE-Strata Professional PSE-Strata-Pro-24 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

A current NGFW customer has asked a systems engineer (SE) for a way to prove to their internal management team that its NGFW follows Zero Trust principles. Which action should the SE take?

Options:

A.

Use the "Monitor > PDF Reports" node to schedule a weekly email of the Zero Trust report to the internal management team.


B.

Help the customer build reports that align to their Zero Trust plan in the "Monitor > Manage Custom Reports" tab.


C.

Use a third-party tool to pull the NGFW Zero Trust logs, and create a report that meets the customer's needs.


D.

Use the "ACC" tab to help the customer build dashboards that highlight the historical tracking of the NGFW enforcing policies.


Expert Solution
Questions # 12:

Which initial action can a network security engineer take to prevent a malicious actor from using a file-sharing application for data exfiltration without impacting users who still need to use file-sharing applications?

Options:

A.

Use DNS Security to limit access to file-sharing applications based on job functions.


B.

Use App-ID to limit access to file-sharing applications based on job functions.


C.

Use DNS Security to block all file-sharing applications and uploading abilities.


D.

Use App-ID to block all file-sharing applications and uploading abilities.


Expert Solution
Questions # 13:

A company with Palo Alto Networks NGFWs protecting its physical data center servers is experiencing a performance issue on its Active Directory (AD) servers due to high numbers of requests and updates the NGFWs are placing on the servers. How can the NGFWs be enabled to efficiently identify users without overloading the AD servers?

Options:

A.

Configure Cloud Identity Engine to learn the users' IP address-user mappings from the AD authentication logs.


B.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect Windows SSO to gather user information.


C.

Configure data redistribution to redistribute IP address-user mappings from a hub NGFW to the other spoke NGFWs.


D.

Configure an NGFW as a GlobalProtect gateway, then have all users run GlobalProtect agents to gather user information.


Expert Solution
Questions # 14:

Which three known variables can assist with sizing an NGFW appliance? (Choose three.)

Options:

A.

Connections per second


B.

Max sessions


C.

Packet replication


D.

App-ID firewall throughput


E.

Telemetry enabled


Expert Solution
Questions # 15:

Which two statements clarify the functionality and purchase options for Palo Alto Networks AIOps for NGFW? (Choose two.)

Options:

A.

It is offered in two license tiers: a commercial edition and an enterprise edition.


B.

It is offered in two license tiers: a free version and a premium version.


C.

It uses telemetry data to forecast, preempt, or identify issues, and it uses machine learning (ML) to adjust and enhance the process.


D.

It forwards log data to Advanced WildFire to anticipate, prevent, or identify issues, and it uses machine learning (ML) to refine and adapt to the process.


Expert Solution
Questions # 16:

A prospective customer wants to validate an NGFW solution and seeks the advice of a systems engineer (SE) regarding a design to meet the following stated requirements:

"We need an NGFW that can handle 72 Gbps inside of our core network. Our core switches only have up to 40 Gbps links available to which new devices can connect. We cannot change the IP address structure of the environment, and we need protection for threat prevention, DNS, and perhaps sandboxing."

Which hardware and architecture/design recommendations should the SE make?

Options:

A.

PA-5445 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-2 or virtual wire mode that include 2 x 40Gbps interfaces on both sides of the path.


B.

PA-5430 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-3 mode that include 40Gbps interfaces on both sides of the path.


C.

PA-5445 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-3 mode that include 40Gbps interfaces on both sides of the path.


D.

PA-5430 or larger to cover the bandwidth need and the link types; Architect aggregate interface groups in Layer-2 or virtual wire mode that include 2 x 40Gbps interfaces on both sides of the path.


Expert Solution
Questions # 17:

A customer sees unusually high DNS traffic to an unfamiliar IP address. Which Palo Alto Networks Cloud-Delivered Security Services (CDSS) subscription should be enabled to further inspect this traffic?

Options:

A.

Advanced Threat Prevention


B.

Advanced WildFire


C.

Advanced URL Filtering


D.

Advanced DNS Security


Expert Solution
Questions # 18:

A security engineer has been tasked with protecting a company's on-premises web servers but is not authorized to purchase a web application firewall (WAF).

Which Palo Alto Networks solution will protect the company from SQL injection zero-day, command injection zero-day, Cross-Site Scripting (XSS) attacks, and IIS exploits?

Options:

A.

Threat Prevention and PAN-OS 11.x


B.

Advanced Threat Prevention and PAN-OS 11.x


C.

Threat Prevention, Advanced URL Filtering, and PAN-OS 10.2 (and higher)


D.

Advanced WildFire and PAN-OS 10.0 (and higher)


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions